完整後設資料紀錄
DC 欄位語言
dc.contributor.authorXiong, Weien_US
dc.contributor.authorHu, Hanpingen_US
dc.contributor.authorXiong, Naixueen_US
dc.contributor.authorYang, Laurence T.en_US
dc.contributor.authorPeng, Wen-Chihen_US
dc.contributor.authorWang, Xiaofeien_US
dc.contributor.authorQu, Yanzhenen_US
dc.date.accessioned2014-12-08T15:33:53Z-
dc.date.available2014-12-08T15:33:53Z-
dc.date.issued2014-02-10en_US
dc.identifier.issn0020-0255en_US
dc.identifier.urihttp://dx.doi.org/10.1016/j.ins.2013.04.009en_US
dc.identifier.urihttp://hdl.handle.net/11536/23369-
dc.description.abstractCloud computing represents a new paradigm where computing resources are offered as services in the world via communication Internet. As many new types of attacks are arising at a high frequency, the cloud computing services are exposed to an increasing amount of security threats. To reduce security risks, two approaches of the network traffic anomaly detection in cloud communications have been presented, which analyze dynamic characteristics of the network traffic based on the synergetic neural networks and the catastrophe theory. In the former approach, a synergetic dynamic equation with a group of the order parameters is used to describe the complex behaviors of the network traffic system in cloud communications. When this equation is evolved, only the order parameter determined by the primary factors can converge to 1. Then, the anomaly can be detected. In the latter approach; a catastrophe potential function is introduced to describe the catastrophe dynamic process of the network traffic in cloud communications. When anomalies occur, the state of the network traffic will deviate from the normal one. To assess the deviation, an index named as catastrophe distance is defined. The network traffic anomaly can be detected by the value of this index. We evaluate the performance of these two approaches using the standard Defense Advanced Research Projects Agency data sets. Experimental results show that our approaches can effectively detect the network traffic anomaly and achieve the high detection probability and the low false alarms rate. (C) 2013 Published by Elsevier Inc.en_US
dc.language.isoen_USen_US
dc.subjectAnomaly detectionen_US
dc.subjectCloud communicationen_US
dc.subjectNetwork trafficen_US
dc.subjectSynergetic neural networksen_US
dc.subjectCatastrophe theoryen_US
dc.subjectChaotic dynamicsen_US
dc.titleAnomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communication?en_US
dc.typeArticleen_US
dc.identifier.doi10.1016/j.ins.2013.04.009en_US
dc.identifier.journalINFORMATION SCIENCESen_US
dc.citation.volume258en_US
dc.citation.issueen_US
dc.citation.spage403en_US
dc.citation.epage415en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000329262200027-
dc.citation.woscount1-
顯示於類別:期刊論文


文件中的檔案:

  1. 000329262200027.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。